Chapter 1 Quiz

11 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
Which of the following characteristics relates to access control? a. the feature of network design that ensures the existence of multiple pathways of communication b. an attack that occurs when a hacker uses a network snigger to watch a communications session to learn its parameters c. the process or mechanism of granting or denying use of resources; typically applied to users or generic network traffic d. the process of confirming the identity of a user
answer
c. the process or mechanism of granting or denying use of resources; typically applied to users or generic network traffic
question
Which term describes an object, computer, program, piece of data, or other logical or physical component that you use in a business process to accomplish a business task? a. asset b. client c. appliance d. trust
answer
a. asset
question
When conducting an audit, the auditor should be which of the following? a. an internal employee who can be trusted b. an external person capable of hacking c. an internal employee capable of enclosing or encasing one protocol or packet inside another protocol or packet d. an external person who is independent of the organization under audit
answer
d. an external person who is independent of the organization under audit
question
Which of the following describes authentication? a. the process of confirming the identity of a user b. confidence in the expectation that others will act in your best interest or that a resource is authentic c. a small network, workgroup, or client/server, deployed by a small business, a home-based business, or just a family network in a home d. a stated purpose or target for network security
answer
a. the process of confirming the identity of a user
question
Which term describes when a system is usable for its intended purpose? a. authorization b. auditing c. encryption d. availability
answer
d. availability
question
Which of the following is the name given to unauthorized access to a system unofficially with no bad intent? a. hijacking b. backdoor c. tunneling d. exploit
answer
b. backdoor
question
Which of the following describes a blacklist? a. a security mechanism to detect and prevent attempts to breach security b. a type of filtering in which all activities or entities are permitted except those identified c. a list of the hosts and servers on the network d. a list that describes the steps to lock down a host against threats and attacks
answer
b. a type of filtering in which all activities or entities are permitted except those identified
question
Which term describes a network device that forwards traffic between networks based on the MAC address of the Ethernet frame? a. domain b. bottleneck c. bridge d. node
answer
c. bridge
question
Which of the following describes caching? a. a network service that acts as a "middle man" between a client and server b. retention of Internet content by a proxy server c. filtering traffic as it attempts to enter a network d. a mechanism to establish a secure remote access connection across an intermediary network
answer
b. retention of Internet content by a proxy server
question
Which of the following characteristics relates to a demilitarized zone (DMZ)? a. confidence in the expectation that others will act in your best interest or that a resource is authentic b. a type of perimeter network used to host resources designated as accessible by the public from the Internet c. a form of networking where each computer is a peer d. a host on a network
answer
b. a type of perimeter network used to host resources designated as accessible by the public from the Internet
question
Which of the following refers to a form of attack that attempts to compromise availability? a. zero day exploits b. man-in-the-middle (mitm) c. denial of service (DoS) d. sniffer
answer
c. denial of service (DoS)
question
Which of the following refers to filtering traffic as it attempts to leave a network, which can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations? a. router b. egress filtering c. auditing d. whitelist
answer
b. egress filtering
question
A security policy is important for all of the following reasons except which one? a. it establishes goals b. it helps with planning c. with it, you cannot trust the network's security d. it helps you respond, contain, and repair
answer
c. with it, you cannot trust the network's security
question
Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules? a. sniffer b. auditor c. hacket d. firewall
answer
d. firewall
question
Which of the following terms refers to the process of securing or locking down a host against threats and attacks? a. auditing b. redundancy c. authorization d. hardening
answer
d. hardening
question
True or False: Integrity prevents unauthorized changes to data. a. true b. false
answer
a. true
question
True or False: The term monitoring refers to the act of creating or recording events into a log. a. true b. false
answer
b. false
question
True or False: A chokepoint is a form of bottleneck and is a single, controlled pathway between two different levels of network trust where a firewall or other filtering devices block or allow traffic based on a set of rules. a. true b. false
answer
a. true
question
True or False: Intrusion detection system (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises. a. true b. false
answer
a. true
question
True or False: The term zero day exploit describes a new and previously unknown attack for which there is not a current specific defense. a. true b. false
answer
a. true